Description
Validate-before-filter vulnerability in cleanhtml.pl 1.129 in LiveJournal CVS before Dec 7 2005, when the cleancss option is enabled, allows remote attackers to conduct cross-site scripting (XSS) attacks via a "\" (backslash) within a "javascript" scheme in a style property (such as "javas\cript"), which bypasses the "javascript" check before the "\" is stripped and then rendered in web browsers that allow scripting in style sheets.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Andrew Farmer · textwebappscgi
https://www.exploit-db.com/exploits/26917
References (7)
Core 7
Core References
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/18157
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/21896
Mailing List mailing-list
x_refsource_fulldisc
http://marc.info/?l=full-disclosure&m=113504421421972&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/23839
Various Sources x_refsource_confirm
http://cvs.livejournal.org/browse.cgi/livejournal/cgi-bin/cleanhtml.pl
Third Party Advisory mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2005-12/1000.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15990
Scores
EPSS
0.0047
EPSS Percentile
64.7%
Details
Status
published
Products (1)
livejournal/livejournal
Published
Dec 21, 2005
Tracked Since
Feb 18, 2026